Certified in Cybersecurity | CC | (ISC)2 (e-learning)
Description
Certified in Cybersecurity | CC
This learning will provide foundational knowledge and skills required for an entry or junior-level cybersecurity role as you prepare for the Certification exam: (ISC)² Certified in Cybersecurity.
Audience
If you’re looking to join a dynamic and rewarding workforce, get Certified in Cybersecurity and demonstrate to employers you have the foundational knowledge and passion to join their team. This certification is ideal for:
– IT professionals
– Career changers looking to transition into cybersecurity
– College students or recent graduates
Package Includes
– 12 months online e-elearning access
Inhoud
1. Certified in Cybersecurity (CC): Core Security Princi…

Foire aux questions (FAQ)
Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.
Certified in Cybersecurity | CC
This learning will provide foundational knowledge and skills required for an entry or junior-level cybersecurity role as you prepare for the Certification exam: (ISC)² Certified in Cybersecurity.
Audience
If you’re looking to join a dynamic and rewarding workforce, get
Certified in Cybersecurity and demonstrate to employers you have
the foundational knowledge and passion to join their team. This
certification is ideal for:
– IT professionals
– Career changers looking to transition into cybersecurity
– College students or recent graduates
Package Includes
– 12 months online e-elearning access
Inhoud
1. Certified in Cybersecurity (CC): Core Security
Principles & Risk Management
It is of high
importance that organizations operate upon a solid foundation of
security principles, concepts, and risk management. It is
impossible to reduce security risk until core security and risk
management principles are defined.
2. Certified in Cybersecurity (CC): Security
Governance, Policies, & Controls
Security
governance is a huge part of overall corporate or organizational
governance. The security practitioner must be aware of various
governance elements, regulations, laws, standards, policies, and
procedures.
3. Certified in Cybersecurity (CC): Incident
Response
Practically anything that occurs in the
enterprise can be called an event, but not all events are negative
occurrences. It is the problematic events that are managed with the
incident response practice.
4. Certified in Cybersecurity (CC): Business Continuity
Planning
Many organizations nowadays have become
aware of the need for business continuity planning, also known as
continuity of operations. The main objective of a business
continuity plan (BCP) is for an organization to maintain
organizational operations while recovering from a major
interruption.
5. Certified in Cybersecurity (CC): Physical Access
Controls
Many security practitioners learn about
physical security by comparing it to protecting a medieval castle.
Defense in Depth (DiD) relies on multiple layers of independent
methods of security and must be used with either an outward-in or
inward-out approach.
6. Certified in Cybersecurity (CC): Logical Access
Controls
There is often a blurred line between
physical and logical access control, as the systems typically
function together. In this course, you will explore the logical
aspect of Defense in Depth and security controls.
7. Certified in Cybersecurity (CC): Networking &
Security Infrastructure
Although new security
practitioners can come from development, database, or other
backgrounds, the majority of security professionals come from a
networking background. It is virtually impossible to separate
networking knowledge from security expertise.
8. Certified in Cybersecurity (CC): Present Threats
& Network Security Controls
The constant
emergence of new security threats, variants, vectors, and
technologies is an ongoing challenge to keep up with.
9. Certified in Cybersecurity (CC): Data Security &
System Hardening
For many organizations, data is
the most critical asset to be secured. Begin this course by
exploring the data life cycle, or the different phases a piece of
data goes through, from data creation to data destruction.
10. Certified in Cybersecurity (CC): Security Best
Practices & Security Awareness
A mature and
successful organization will follow guidance and best practices to
better secure all resources. Stakeholders at every level must
understand their roles and responsibilities for contributing to a
secure environment.
Datum
U kunt ten alle tijden beginnen! Neem hiervoor contact op met een van onze opleidingsadviseurs.
Locaties
Zelfstudie
Leermethodiek
E-Learning
Taal
Engels
Deze training is ook beschikbaar als
– Maatwerktraining, neem hiervoor contact op met een van onze opleidingsadviseurs.
Leren is een persoonlijk proces met unieke leerstijlen. Als het aankomt op effectieve training, is er niet een “one size fits all” leermethode die iedereen past. Effectieve training houdt rekening met diversiteit door gepersonaliseerde aanpak. Dat kan met o.a. interactieve workshops, e-learning en samenwerking. Mensen hebben verschillende leerstijlen en behoeften - de kunst is om voor iedereen de perfecte pasvorm te vinden.
Bij Dutchtrain begrijpen we dat iedereen op een andere manier leert. Daarom bieden we een breed scala aan leervormen aan, zodat iedereen de gewenste kennis en vaardigheden kan opdoen op de manier die het beste bij hem of haar past. Of je nu liever zelfstandig studeert, in een klaslokaal zit of online lessen volgt, wij hebben een oplossing die aansluit bij jouw leerstijl.
Bij DutchTrain staan wij voor je klaar.
Dutchtrain "Verder niks nodig"
Rester à jour sur les nouveaux avi
Partagez vos avis
Avez-vous participé à formation? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.